Plagarism

Research at least two recent articles concerning plagiarism incidents in the news.  The article should be no more than two years old.  Use the issue presented in the article to continue the discussion using the guidelines below.

Tasks

Identify and discuss the plagiarized issue within the article, then address the following questions in your main discussion post:

  1. In what way did the plagiarized work impact others? 
  2. What was the penalty? 
  3. Present your own advice on how to prevent future plagiarism v

css215 discussion post

Consider the Millennium Health project that you have been working on throughout the course and provide answers to the following prompts based the Business Support System (BSS):

  1. Which installation strategy would you recommend? Support your answer with an explanation.
  2. List three or four testing criteria that you would use to test the BSS system to ensure it is ready for production use. Make sure that your testing criteria is adequately descriptive. If not, provide an explanation for it.
  3. Consider the four types of maintenance discussed in Chapter 14 of the textbook. Which type do you think is most likely to be needed for the BSS system? Support your answer with an explanation.
  4. Corrective maintenance is by far the most frequent form of maintenance. What can you do as a systems analyst to reduce this form of maintenance?

BSW 11

In 250-300 words

 

You are the web master of a college website. You share a server with other school departments such as accounting and HR. create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

discussion api

 Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them? 

Hate Crime Ecpa act

1. Legally define “hate crime,” and explain why hate crime legislation has been so controversial in the United States.

2. What are the major requirements established by the Electronic Communication Privacy Act?

implementation of innovation technologies.

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Intro to programming responses

Provide (2) 200 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

An if-then script simply takes an argument from a variable and checks to see if it is true. If it is true, then it executes the parameter. If it is false, then it executes a different parameter which can be another defined variable or an exit condition. Loops repeats the processed if-then program as many times as indicated within the set parameters until an exit condition is reached. The loop needs an exit condition that can be met or it can become an endless loop, or infinite loop. An infinite loop can accidentally use up 100% of your CPU usage that will lock up your device or cause it to crash. Ways to avoid an endless loop is to always make sure to set an exit condition that can be met, or makes sense to the language you are programming in. There may be a “continue” statement with another variable that could be out of place preventing the code to move on and continuously loop. Another way to prevent infinite loops is to set timeout conditions in your code. Also, if you are working with complex loops that have the potential to be endless, you may consider testing your code first through a walk-through program, such as the Python Tutor we will be using in this class and others such as Google Chrome Dev Tools. This will allow you to step through and visualize what your program is doing.

Endless loops can create a denial of service (DOS). You may accidentally DOS yourself! In fact, you can set up a simple script that throws specific types of packets to a single router or switch interface (IP and port range) over and over again causing a denial of service effect. You can also overwhelm firewalls by doing this, especially if they are doing deep packet inspections. There are several quirky vulnerabilities out there listed in the MITRE CVE that has exploits like this already written and tested. Building a virtual range to test these out is a lot of fun and you learn networking quickly.

RESPONSE 2:

This week we learned about variables along with creating loops and if-then scripts. Our textbook, Microsoft WSH and VBScript Programming for the Absolute Beginner, 4th Ed. by Jerry L. Ford, defines a variable as “an individual piece of data such as a name, number, or date that is stored in memory” (2014, p. 85). Variables are the numbers, dates or names in which you are looking for or defining in your scripts. For example, in this week’s practice scripts, fnum, snum, and total were the variables that were being defined. Once we defined are variables, we were able to look more into loops and if-then scripts.

Loops are “collection of statements repeatedly executed to facilitate the processing of large amounts of data” (Ford, 2014, p. 144). Loops could be used to repeat a certain function until the end condition is met. For example, in this week’s practice loop script, we set a up a loop where the program would produce numbers between the first variable, fnum, to the second variable, snum. Once the computer reached snum, the condition was met and the loop ended. The if-then script we learned included a loop, however, the loop would only run if the second number we typed was greater than the first number we chose. If the first number was larger than the second number, the loop would not run. In order to run the loop, the condition must be met prior to the program running the script. The whole purpose of the if-then script is to determine if the argument depicted in the script is accurate based off the variables provided. If the variables make the script accurate then it runs; if not, then it doesn’t run the script.

When creating loops, individuals might incorrectly type an “exit function” or create an improper condition to stop the loop. If this happens, an endless loop could be created. Based off initial research, endless loops are not necessarily dangerous, but rather annoying. Most people can exit an endless loop by doing a hard-exit of the program, or even shutting down their computer. However, some individuals might create an endless loop in order to create a DoS (Denial of Service) attack. DoS attacks are meant to prevent a person from using a certain program, and if someone was stuck in an endless loop, they would not be able to use that program until they manage to exit or stop the loop.

Digital Forensics

 

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences.